Entry Bertino:1999:SEA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Bertino:1999:SEA,
  author =       "Elisa Bertino and Elena Ferrari and Vijay Atluri",
  title =        "The specification and enforcement of authorization
                 constraints in workflow management systems",
  journal =      j-TISSEC,
  volume =       "2",
  number =       "1",
  pages =        "65--104",
  month =        feb,
  year =         "1999",
  CODEN =        "ATISBQ",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Jul 27 17:35:45 MDT 1999",
  bibsource =    "http://www.acm.org/tissec/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  URL =          "http://www.acm.org:80/pubs/citations/journals/tissec/1999-2-1/p65-bertino/",
  abstract =     "In recent years, workflow management systems (WFMSs)
                 have gained popularity in both research and commercial
                 sectors. WFMSs are used to coordinate and streamline
                 business processes. Very large WFMSs are often used in
                 organizations with users in the range of several
                 thousands and process instances in the range of tens
                 and thousands. To simplify the complexity of security
                 administration, it is common practice in many
                 businesses to allocate a role for each activity in the
                 process and then assign one or more users to each
                 role---granting an authorization to roles rather than
                 to users. Typically, security policies are expressed as
                 constraints (or rules) on users and roles; {\em
                 separation of duties\/} is a well-known constraint.
                 Unfortunately, current role-based access control models
                 are not adequate to model such constraints. To address
                 this issue we (1) present a language to express both
                 static and dynamic authorization constraints as clauses
                 in a logic program; (2) provide formal notions of
                 constraint consistency; and (3) propose algorithms to
                 check the consistency of constraints and assign users
                 and roles to tasks that constitute the workflow in such
                 a way that no constraints are violated.",
  acknowledgement = ack-nhfb,
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "security",
  subject =      "{\bf H.2.0} Information Systems, DATABASE MANAGEMENT,
                 General, Security, integrity, and protection**.",
}

Related entries